Cybersecurity law : protect yourself and your customers / Shimon Brathwaite.
Material type: TextSeries: Business law and corporate risk management collectionPublisher: New York, New York (222 East 46th Street, New York, NY 10017) : Business Expert Press, [(c)2019.]Description: 1 online resource (108 pages)Content type:- text
- computer
- online resource
- 9781948976732
- Data protection -- Law and legislation
- Computer security -- Law and legislation
- Cybersecurity
- Information security law
- Cybersecurity legislation
- Data privacy laws
- Cyber law and intellectual property
- Encryption
- Encryption laws
- Data ownership
- Pipeda
- Phipa
- Privacy act
- Data regulation
- Personally identifiable information
- Online privacy protection act
- Outsourcing liability
- Outsourcing data privacy
- How to outsource data privacy
- Cybersecurity specific insurance
- Cybersecurity insurance
- Cyber insurance
- Cybersecurity insurance plan
- Data privacy and law enforcement
- Cybersecurity law in Canada
- Cybersecurity law in the United States
- How to automate compliance
- Patch management
- Lawsuits
- Internet law
- Data breaches
- Digital assets
- Ditigal asset protection
- K3264.C65
- COPYRIGHT NOT covered - Click this link to request copyright permission: https://lib.ciu.edu/copyright-request-form
Item type | Current library | Collection | Call number | URL | Status | Date due | Barcode | |
---|---|---|---|---|---|---|---|---|
Online Book (LOGIN USING YOUR MY CIU LOGIN AND PASSWORD) | G. Allen Fleece Library ONLINE | K3264.C65 (Browse shelf(Opens below)) | Link to resource | Available | BEP9781948976732 | |||
Online Book (LOGIN USING YOUR MY CIU LOGIN AND PASSWORD) | G. Allen Fleece Library | Non-fiction | K3264.C65 (Browse shelf(Opens below)) | Link to resource | Available | 9781948976732 |
Includes index.
Chapter 1. Introduction to information security law -- Chapter 2. Cyber law and intellectual property -- Chapter 3. What are the corporate requirements for cybersecurity? -- Chapter 4. What are the financial and reputational implications of information security legislation -- Chapter 5. Required encryption standards -- Chapter 6. How to offload legal liability onto third parties -- Chapter 7. The importance of cybersecurity specific insurance -- Chapter 8. What type of people and policies should you have to ensure you are complying with regulations.
Access restricted to authorized users and institutions.
Information security refers to a set of strategies for managing the processes, tools, and policies necessary to prevent, detect, document and counter threats to digital and non-digital information. Infosec responsibilities include establishing a set of business processes that will protect informa-tion assets regardless of how the information is formatted or whether it is in transit, being processes or is at rest in storage "Definition from WhatIs.com (n.d.). Retrieved from https://searchsecurity.techtarget.com/definition/information-security-infosec." With the growth and popularization of the Internet, the Internet of things (IOT) and e-commerce informa-tion security has become extremely important in most organizations. IOT refers to the connection of physical devices such as laptops, home appliances, cars, senors and other electronics to one another through the Internet. This mass connection of devices is constantly collecting infor-mation on their usage, location and user behaviors and this information is usually sent to and stored in a database somewhere on the Internet.
COPYRIGHT NOT covered - Click this link to request copyright permission:
https://lib.ciu.edu/copyright-request-form
Mode of access: World Wide Web.
System requirements: Adobe Acrobat reader.
Description based on PDF viewed 03/31/2019.
There are no comments on this title.